Search

Your search keyword '"ElGamal"' showing total 176 results

Search Constraints

Start Over You searched for: Descriptor "ElGamal" Remove constraint Descriptor: "ElGamal"
176 results on '"ElGamal"'

Search Results

1. A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts.

2. Enhancing Data Security through Machine Learning-based Key Generation and Encryption.

3. A Cognitive Comparative Analysis of Geometric Shape-Based Cryptosystem

4. PEPFL: A framework for a practical and efficient privacy-preserving federated learning

5. Preserving Genotype Privacy Using AES and Partially Homomorphic Encryption.

6. A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts

7. Fine-Grained Encrypted Image Retrieval in Cloud Environment.

8. Pengamanan Data Teks Menggunakan Algoritma Kriptografi Elgamal dan XOR dari Serangan Hacker.

9. Blind Decryption and Private Information Delivery

11. Performance Analysis of Various Asymmetric Public-Key Cryptosystem

12. Securing Transactions Using Hybrid Cryptography in E-commerce Apps.

13. Utilizing Trusted Lightweight Ciphers to Support Electronic-Commerce Transaction Cryptography.

16. Homomorphic Decryption in Blockchains via Compressed Discrete-Log Lookup Tables

17. PKI-Based Security Enhancement for IoT in 5G Networks

18. Enhancing Organizational Data Security on Employee-Connected Devices Using BYOD Policy.

19. Fine-Grained Encrypted Image Retrieval in Cloud Environment

20. Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks

21. A security hybrid mechanism using fuzzy with adaptive ElGamal approach in cloud.

22. Enhanced biometric template protection schemes for securing face recognition in IoT environment

24. Utilizing Trusted Lightweight Ciphers to Support Electronic-Commerce Transaction Cryptography

25. Enhancing Organizational Data Security on Employee-Connected Devices Using BYOD Policy

26. Object Oriented Analysis And Design Of El Gamal Digital Signature Algorithm For Document Authentication In E-Learning.

27. An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on ElGamal

28. Efficient Ballot Casting in Ranked Based Voting System Using Homomorphic Encryption

30. Encryption and Re-Randomization Techniques for Malware Propagation

31. Evolvable Hardware-Based Data Security System Using Image Steganography Through Dynamic Partial Reconfiguration.

32. Elliptic curve ElGamal encryption based location privacy-preserving scheme

33. Elliptic curve ElGamal encryption based location privacy-preserving scheme

34. An Efficient ElGamal Encryption Scheme Based on Polynomial Modular Arithmetic in

35. Performance analysis of NTRU algorithm with non-post-quantum algorithms.

36. FPGA Design of Elliptic Curve Cryptosystem (ECC) for Isomorphic Transformation and EC ElGamal Encryption.

37. An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption

38. Computation of a 768-Bit Prime Field Discrete Logarithm

40. Performance Analysis of LEACH and LEACH-CC Protocol with Cryptographic Algorithms in Wireless Sensor Networks.

41. Comparison of two Public Key Cryptosystems

42. Utilizing Trusted Lightweight Ciphers to Support Electronic-Commerce Transaction Cryptography

43. Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation

44. IMPLEMENTASI ALGORITMA ELGAMAL DALAM SISTEM LOCK BRANKAS BERBASIS MIKROKONTROLER ATMEGA16 DAN SMARTPHONE ANDROID

45. An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme.

46. Primjene eliptičkih krivulja u kriptografiji

47. An Elgamal Encryption Scheme of Fibonacci Q-Matrix and Finite State Machine

Catalog

Books, media, physical & digital resources